• Mobile device management checklist

    A well-thought-out mobile device management strategy is a key ingredient for any successful deployment. In this checklist, we arm those responsible for managing smartphones and mobile devices with ...

  • Smartphone insecurity: There's an app for that

    Available smartphone apps are so impressive that users are flocking to mobile marketplaces such as iTunes App Store, Android Marketplace and BlackBerry App World. To protect business-use smartphone...

  • Streamlining mobile device management with SaaS

    Successful mobile device management includes collecting and maintaining tax documentation, managing expense reports and streamlining mobile device administration costs. Learn about the tax liabilit...

  • Secure mobility may require more than SSL VPN

    Technology has radically changed what it means to "go to work," but remote access is a far cry from secure mobility. Enterprises with WAN security in mind must think about the two in tandem.

Mobile Security and Management

Email Alerts

Register now to receive SearchNetworking.co.uk-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Integrated wired and wireless LAN security? Not so fast

    Combining wired and wireless LAN security solutions may be a plus for smaller companies, but larger enterprises fear security integration could result in vulnerabilities. 

  • Mobile device management checklist

    A well-thought-out mobile device management strategy is a key ingredient for any successful deployment. In this checklist, we arm those responsible for managing smartphones and mobile devices with strategies that can and should be applied now to redu... 

  • Smartphone insecurity: There's an app for that

    Available smartphone apps are so impressive that users are flocking to mobile marketplaces such as iTunes App Store, Android Marketplace and BlackBerry App World. To protect business-use smartphones, enterprises need to lock in IT policies and deploy... 

  • Best practices for enterprise mobile device security

    Using personal mobile devices and smartphones to connect to enterprise networks is a huge security risk. Here are some best practices for enterprise mobile device security and key criteria for enforceable mobile device management policies. 

  • Streamlining mobile device management with SaaS

    Successful mobile device management includes collecting and maintaining tax documentation, managing expense reports and streamlining mobile device administration costs. Learn about the tax liabilities associated with inaccurate mobile usage reports, ... 

  • iOS4 mobile device management features ease anxiety

    New iOS4 mobile device management capabilities in Apple iPhones, iPads and iPods are allowing IT managers to more easily control iOS4-based devices with third-party mobile device management software, along with other enterprise mobile devices. 

  • Creating, applying and enforcing a mobile device policy

    Establishing a clear mobile device policy can help organizations enjoy mobility's business benefits. Mobility expert Michael Finneran speaks with Rivka Little about developing a mobile device policy and applying policy to mobile users. 

About Mobile Security and Management

With the influx of mobile devices in the workplace, enterprise IT shops are seeking new UK mobile security and mobile management strategies. In this section, learn about mobile device management strategies and implementing enterprise mobile user policies and remote management of mobile devices. Explore enterprise mobile security strategies that include device encryption tools to keep data safe on tablets, smartphones and other mobile devices, as well as user authentication strategies and other methods for providing secure mobile access to the enterprise network.